OPSWAT Announces FileScan.IO Asset Acquisition. Read More

Deep CDR

Protecting against malicious files with embedded content

Data Sanitization (CDR), Part 3: Active Content Curing

October 09, 2015 by Yiyi Miao
After discussing content disarm and reconstruction (CDR) in general in part one of this series and file structure alterations in part two, I am now ready to...

Data Sanitization (CDR), Part 2: File Structure Alterations

August 08, 2015 by Yiyi Miao
As mentioned in the introductory post in this series, topic for discussion is content disarm and reconstruction (CDR), or data sanitization, via file structure...

Deep Content Disarm and Reconstruction (Deep CDR), Part 1: The Case for Data Sanitization

July 09, 2015 by Yiyi Miao
Document-based malware exploits are an incredibly common method for attack. The types of malware distributed via this method are representative of today's...

How to Stop Macro-Based Malware in Its Tracks

April 04, 2015 by Yiyi Miao
Recent articles about the Dridex botnet and the Adnel and Tarbir malware have reported a resurgence in malware embedded as macros within Microsoft Office...

Using Data Sanitization to Eliminate Malware Embedded in Documents

November 06, 2014 by Yiyi Miao
We have previously explored how Metascan can be used to eliminate threats embedded in image files. Another potential threat vector involving embedded malware...

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.